IEEE Communications Surveys and Tutorials最新文献

筛选
英文 中文
Toward 6G Optical Fronthaul: A Survey on Enabling Technologies and Research Perspectives 迈向 6G 光前端:有关使能技术和研究前景的调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-06-03 DOI: 10.1109/COMST.2024.3408090
Abdulhalim Fayad;Tibor Cinkler;Jacek Rak
{"title":"Toward 6G Optical Fronthaul: A Survey on Enabling Technologies and Research Perspectives","authors":"Abdulhalim Fayad;Tibor Cinkler;Jacek Rak","doi":"10.1109/COMST.2024.3408090","DOIUrl":"10.1109/COMST.2024.3408090","url":null,"abstract":"The anticipated launch of the Sixth Generation (6G) of mobile technology by 2030 will mark a significant milestone in the evolution of wireless communication, ushering in a new era with advancements in technology and applications. 6G is expected to deliver ultra-high data rates and almost instantaneous communications, with three-dimensional coverage for everything, everywhere, and at any time. In the 6G Radio Access Networks (RANs) architecture, the Fronthaul connects geographically distributed Remote Units (RUs) to Distributed/Digital Units (DUs) pool. Among all possible solutions for implementing 6G fronthaul, optical technologies will remain crucial in supporting the 6G fronthaul, as they offer high-speed, low-latency, and reliable transmission capabilities to meet the 6G strict requirements. This survey provides an explanation of the 5G and future 6G optical fronthaul concept and presents a comprehensive overview of the current state of the art and future research directions in 6G optical fronthaul, highlighting the key technologies and research perspectives fundamental in designing fronthaul networks for 5G and future 6G. Additionally, it examines the benefits and drawbacks of each optical technology and its potential applications in 6G fronthaul networks. This paper aims to serve as a comprehensive resource for researchers and industry professionals about the current state and future prospects of 6G optical fronthaul technologies, facilitating the development of robust and efficient wireless networks of the future.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"629-666"},"PeriodicalIF":34.4,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141276523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity of Satellite Communications Systems: A Comprehensive Survey of the Space, Ground, and Links Segments 卫星通信系统的网络安全:对空间、地面和链接部分的全面调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-06-03 DOI: 10.1109/COMST.2024.3408277
Sara Salim;Nour Moustafa;Martin Reisslein
{"title":"Cybersecurity of Satellite Communications Systems: A Comprehensive Survey of the Space, Ground, and Links Segments","authors":"Sara Salim;Nour Moustafa;Martin Reisslein","doi":"10.1109/COMST.2024.3408277","DOIUrl":"10.1109/COMST.2024.3408277","url":null,"abstract":"Satellite communications (Satcoms) systems have become an integral part of modern society, providing critical infrastructure for a wide range of applications. However, as the reliance on Satcoms has increased, cyberattacks on Satcoms systems have emerged as a severe concern, with the potential to cause significant disruption, economic losses, and even loss of life. We first give a tutorial-style overview of the architecture of a Satcoms system, which typically consists of a space segment, a ground segment (encompassing the terrestrial ground stations and users), and a links segment. Following the taxonomy provided by this segment structure, we provide—to the best of our knowledge—the first comprehensive survey of the state-of-the-art cyberattacks (cyberthreats) on all three segments of Satcoms systems. For each Satcoms system segment, we organize the cyberattacks according to categories of Satcoms-specific cyberattacks, which we relate to the threat classifications in the general STRIDE cyberthreat model. Also, for all three segments of Satcoms systems, we comprehensively survey the general cybersecurity strategies and the specific cybersecurity mechanisms (techniques) that defend Satcoms systems against cyberattacks. We distill the critical learned lessons associated with Satcoms cybersecurity strategies, such as the need to balance security with cost-effectiveness. Finally, we outline the open challenges and future research directions in Satcoms systems cybersecurity.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"372-425"},"PeriodicalIF":34.4,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141944601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview on IEEE 802.11bf: WLAN Sensing
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-06-03 DOI: 10.1109/COMST.2024.3408899
Rui Du;Haocheng Hua;Hailiang Xie;Xianxin Song;Zhonghao Lyu;Mengshi Hu;Narengerile;Yan Xin;Stephen McCann;Michael Montemurro;Tony Xiao Han;Jie Xu
{"title":"An Overview on IEEE 802.11bf: WLAN Sensing","authors":"Rui Du;Haocheng Hua;Hailiang Xie;Xianxin Song;Zhonghao Lyu;Mengshi Hu;Narengerile;Yan Xin;Stephen McCann;Michael Montemurro;Tony Xiao Han;Jie Xu","doi":"10.1109/COMST.2024.3408899","DOIUrl":"https://doi.org/10.1109/COMST.2024.3408899","url":null,"abstract":"With recent advancements, the wireless local area network (WLAN) or wireless fidelity (Wi-Fi) technology has been successfully utilized to realize sensing functionalities such as detection, localization, and recognition. However, the WLANs standards are developed mainly for the purpose of communication, and thus may not be able to meet the stringent requirements for emerging sensing applications. To resolve this issue, a new Task Group (TG), namely IEEE 802.11bf, has been established by the IEEE 802.11 working group, with the objective of creating a new amendment to the WLAN standard to meet advanced sensing requirements while minimizing the effect on communications. This paper provides a comprehensive overview on the up-to-date efforts in the IEEE 802.11bf TG. First, we introduce the definition of the 802.11bf amendment as well as its formation and standardization timeline. Next, we discuss the WLAN sensing use cases with the corresponding key performance indicator (KPI) requirements. After reviewing previous WLAN sensing research based on communication-oriented WLAN standards, we identify their limitations and underscore the practical need for the new sensing-oriented amendment in 802.11bf. Furthermore, we discuss the WLAN sensing framework and procedure used for measurement acquisition, by considering both sensing at sub-7GHz and directional multi-gigabit (DMG) sensing at 60 GHz, respectively, and address their shared features, similarities, and differences. In addition, we present various candidate technical features for IEEE 802.11bf, including waveform/sequence design, feedback types, as well as quantization and compression techniques. We also describe the methodologies and the channel modeling used by the IEEE 802.11bf TG to evaluate the alternative performance. Finally, we discuss the challenges and future research directions to motivate more research endeavors towards this field in detail.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"184-217"},"PeriodicalIF":34.4,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143422793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning in FCAPS: Toward Enhanced Beyond 5G Network Management FCAPS 中的机器推理:面向增强型 5G 网络管理
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-04-30 DOI: 10.1109/COMST.2024.3395414
Abdelkader Mekrache;Adlen Ksentini;Christos Verikoukis
{"title":"Machine Learning in FCAPS: Toward Enhanced Beyond 5G Network Management","authors":"Abdelkader Mekrache;Adlen Ksentini;Christos Verikoukis","doi":"10.1109/COMST.2024.3395414","DOIUrl":"10.1109/COMST.2024.3395414","url":null,"abstract":"The increasing complexity of telecommunication networks has highlighted the need for robust network management frameworks. One such framework is FCAPS, which encompasses a wide range of functionalities, including fault management, configuration management, accounting management, performance management, and security management. To effectively address the complexities of modern networks, the integration of Artificial Intelligence (AI) techniques, particularly Machine Learning (ML) and Machine Reasoning (MR), has emerged as a pivotal strategy within FCAPS. ML provides networks with data-driven algorithms to recognize patterns and make informed predictions, while MR focuses on developing understandable AI systems that draw conclusions based on explicit knowledge. In this paper, we explore the field of MR and its usage within FCAPS. First, we present an overview of the FCAPS framework, including a categorization of FCAPS levels. Then, we provide a novel taxonomy of MR approaches, presenting both traditional and advanced MR. Next, we review MR techniques to address emerging concerns within FCAPS. Finally, we discuss open issues and future directions for further study toward 6G networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2769-2797"},"PeriodicalIF":34.4,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140817907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS-Empowered Satellite-Aerial-Terrestrial Networks With PD-NOMA 利用 PD-NOMA 的 RIS 增强型卫星-空中-地面网络
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-04-25 DOI: 10.1109/COMST.2024.3393612
Rui Liu;Kefeng Guo;Xingwang Li;Kapal Dev;Sunder Ali Khowaja;Theodoros A. Tsiftsis;Houbing Song
{"title":"RIS-Empowered Satellite-Aerial-Terrestrial Networks With PD-NOMA","authors":"Rui Liu;Kefeng Guo;Xingwang Li;Kapal Dev;Sunder Ali Khowaja;Theodoros A. Tsiftsis;Houbing Song","doi":"10.1109/COMST.2024.3393612","DOIUrl":"10.1109/COMST.2024.3393612","url":null,"abstract":"Satellite-aerial-terrestrial network (SATN) is considered as a promising architecture for sixth-generation (6G) wireless communication networks to achieve seamless coverage, flexible wireless access, and high data rate. Moreover, non-orthogonal multiple access (NOMA), and reconfigurable intelligent surface (RIS) can significantly increase spectrum and energy efficiency. Recently, the integration of these two technologies and SATN has attracted a lot of attention both in academia and industry. This survey provides a comprehensive overview of RIS-empowered SATN with NOMA. In particular, the rudimentary knowledge of SATN, NOMA scheme, and RIS technology is presented. Then, the motivations for investigating the NOMA-RIS-assisted SATN are discussed. In addition, we introduce the three usage modes of RIS, two scenarios of NOMA-RIS, and the path loss model of NOMA-RIS-assisted SATN. Next, the system performance is analyzed for a case study. Besides, a comprehensive overview of resource allocation in NOMA-RIS-assisted SATN is provided, where theoretical and artificial intelligence-based methods are compared and analyzed. Moreover, physical layer security and covert communication are selected as two representative security techniques to be discussed in NOMA-RIS-aided SATN. Furthermore, the combination of other emerging technologies with NOMA-RIS-assisted SATN is investigated. Finally, this survey provides a detailed discussion of the main challenges and open issues that need to be deeply investigated from a practical point of view, including channel modeling, channel estimation, deployment strategies, and backhaul control.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2258-2289"},"PeriodicalIF":34.4,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140648730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-Edge-Cloud Collaborative Computing for Deep Learning: A Comprehensive Survey 面向深度学习的端到端云协同计算:全面调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-04-24 DOI: 10.1109/COMST.2024.3393230
Yingchao Wang;Chen Yang;Shulin Lan;Liehuang Zhu;Yan Zhang
{"title":"End-Edge-Cloud Collaborative Computing for Deep Learning: A Comprehensive Survey","authors":"Yingchao Wang;Chen Yang;Shulin Lan;Liehuang Zhu;Yan Zhang","doi":"10.1109/COMST.2024.3393230","DOIUrl":"10.1109/COMST.2024.3393230","url":null,"abstract":"The booming development of deep learning applications and services heavily relies on large deep learning models and massive data in the cloud. However, cloud-based deep learning encounters challenges in meeting the application requirements of responsiveness, adaptability, and reliability. Edge-based and end-based deep learning enables rapid, near real-time analysis and response, but edge nodes and end devices usually have limited resources to support large models. This necessitates the integration of end, edge, and cloud computing technologies to combine their different advantages. Despite the existence of numerous studies on edge-cloud collaboration, a comprehensive survey for end-edge-cloud computing-enabled deep learning is needed to review the current status and point out future directions. Therefore, this paper: 1) analyzes the collaborative elements within the end-edge-cloud computing system for deep learning, and proposes collaborative training, inference, and updating methods and mechanisms for deep learning models under the end-edge-cloud collaboration framework. 2) provides a systematic investigation of the key enabling technologies for end-edge-cloud collaborative deep learning, including model compression, model partition, and knowledge transfer. 3) highlights six open issues to stimulate continuous research efforts in the field of end-edge-cloud deep learning.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2647-2683"},"PeriodicalIF":34.4,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140642243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Mean-Field Game for Dynamic Management and Control in Space-Air-Ground Network 天-空-地网络中用于动态管理和控制的平均场博弈研究
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-04-24 DOI: 10.1109/COMST.2024.3393369
Yao Wang;Chungang Yang;Tong Li;Xinru Mi;Lixin Li;Zhu Han
{"title":"A Survey on Mean-Field Game for Dynamic Management and Control in Space-Air-Ground Network","authors":"Yao Wang;Chungang Yang;Tong Li;Xinru Mi;Lixin Li;Zhu Han","doi":"10.1109/COMST.2024.3393369","DOIUrl":"10.1109/COMST.2024.3393369","url":null,"abstract":"The data traffic volume of the 6th generation (6G) mobile communication networks is huge, and there are novel challenges in various communications services and scenarios. This calls for ultra-dense and heterogeneous deployments of network nodes both on the ground and in space, resulting in ultra-dense space-air-ground network. However, conventional models are not available to analyze and design the interactions among heterogeneous network nodes. Game theory can provide an effective mathematical modeling framework for analysis and design. For the 6G space-air-ground networks, the characteristics of stochastic, ultra-dense, and distributed control will cause conventional game theoretical approaches to confront the challenge of the curse of dimensionality. Mean-field game (MFG) can be introduced to decouple dynamic management and control among agents, to decouple their interactions in a high-dimensional regime. Although the MFG finds wide application, there lacks a comprehensive survey to clarify the basics and summarize the state of the art of MFG research status. In this survey, we investigate and provide an overview of the applications of the MFG. First, we discuss diverse 6G space-air-ground networking paradigms, and then introduce the basic concepts of the MFG. Second, various MFG-based optimal control policies together with mean-field equilibrium (MFE) solutions are investigated and surveyed. Moreover, we discuss the effectiveness of combining the MFG with other game-theoretic approaches and machine learning methods, which leads to the improvement of multi-agent system performances. Finally, we outline some open issues, technical challenges, and future research directions based on the current state of the art.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2798-2835"},"PeriodicalIF":34.4,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140642142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions 元宇宙:调查、趋势、新型管道生态系统和未来方向
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-04-23 DOI: 10.1109/COMST.2024.3392642
H. Sami;A. Hammoud;M. Arafeh;M. Wazzeh;S. Arisdakessian;M. Chahoud;O. Wehbi;M. Ajaj;A. Mourad;H. Otrok;O. Abdel Wahab;R. Mizouni;J. Bentahar;C. Talhi;Z. Dziong;E. Damiani;M. Guizani
{"title":"The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions","authors":"H. Sami;A. Hammoud;M. Arafeh;M. Wazzeh;S. Arisdakessian;M. Chahoud;O. Wehbi;M. Ajaj;A. Mourad;H. Otrok;O. Abdel Wahab;R. Mizouni;J. Bentahar;C. Talhi;Z. Dziong;E. Damiani;M. Guizani","doi":"10.1109/COMST.2024.3392642","DOIUrl":"10.1109/COMST.2024.3392642","url":null,"abstract":"The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art & culture, socialization, commerce, and businesses. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. Moreover, most surveys refrain from providing detailed guidance about the development process of the metaverse, including its impact on technologies, businesses, existing challenges, and potential research directions due to their lack of a macro and micro perception of such a topic. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline and fill the gap in existing Metaverse surveys. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2914-2960"},"PeriodicalIF":34.4,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140639926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revealing Protocol Architecture’s Design Patterns in the Volumetric DDoS Defense Design Space 揭示体积式 DDoS 防御设计空间中的协议架构设计模式
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-04-22 DOI: 10.1109/COMST.2024.3392253
Zhiyi Zhang;Guorui Xiao;Sichen Song;R. Can Aygun;Angelos Stavrou;Lixia Zhang;Eric Osterweil
{"title":"Revealing Protocol Architecture’s Design Patterns in the Volumetric DDoS Defense Design Space","authors":"Zhiyi Zhang;Guorui Xiao;Sichen Song;R. Can Aygun;Angelos Stavrou;Lixia Zhang;Eric Osterweil","doi":"10.1109/COMST.2024.3392253","DOIUrl":"10.1109/COMST.2024.3392253","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks have plagued the Internet for decades. Despite the ever-increasing investments into mitigation solution development, DDoS attacks continue to grow with ever-increasing frequency and magnitude. To identify the root cause of the above-observed trend, in this paper, we conduct a systematic and architectural evaluation of volumetric DDoS detection and mitigation efforts over 24,000 papers, articles, and RFCs over 30+ years. To that end, we introduce a novel approach for systematizing comparisons of DDoS research, resulting in a comprehensive examination of the DDoS literature. Our analysis illustrates a small set of common design patterns across seemingly disparate solutions, and reveals insights into deployment traction and success of DDoS solutions. Furthermore, we discuss economic incentives and the lack of harmony between synergistic but independent approaches for detection and mitigation. As expected, defenses with a clear cost/benefit rationale are more prevalent than those that require extensive infrastructure changes. Finally, we discuss the lessons learned which we hope can shed light on future directions that can potentially turn the tide of the war against DDoS.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"353-371"},"PeriodicalIF":34.4,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140634301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Management From Single-Domain 5G to End-to-End 6G Network Slicing: A Survey 从单域 5G 到端到端 6G 网络切片的资源管理:调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-04-17 DOI: 10.1109/COMST.2024.3390613
Sina Ebrahimi;Faouzi Bouali;Olivier C. L. Haas
{"title":"Resource Management From Single-Domain 5G to End-to-End 6G Network Slicing: A Survey","authors":"Sina Ebrahimi;Faouzi Bouali;Olivier C. L. Haas","doi":"10.1109/COMST.2024.3390613","DOIUrl":"10.1109/COMST.2024.3390613","url":null,"abstract":"Network Slicing (NS) is one of the pillars of the fifth/sixth generation (5G/6G) of mobile networks. It provides the means for Mobile Network Operators (MNOs) to leverage physical infrastructure across different technological domains to support different applications. This survey analyzes the progress made on NS resource management across these domains, with a focus on the interdependence between domains and unique issues that arise in cross-domain and End-to-End (E2E) settings. Based on a generic problem formulation, NS resource management functionalities (e.g., resource allocation and orchestration) are examined across domains, revealing their limits when applied separately per domain. The appropriateness of different problem-solving methodologies is critically analyzed, and practical insights are provided, explaining how resource management should be rethought in cross-domain and E2E contexts. Furthermore, the latest advancements are reported through a detailed analysis of the most relevant research projects and experimental testbeds. Finally, the core issues facing NS resource management are dissected, and the most pertinent research directions are identified, providing practical guidelines for new researchers.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2836-2866"},"PeriodicalIF":34.4,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140607616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信